Saturday, October 25, 2025

Polaris of Enlightenment

How to be anonymous on social media

How to protect your identity depending on whom you're hiding from.

Published July 12, 2025
– By Naomi Brockwell

Using a pseudonym on social media can be an incredibly valuable way to reclaim your privacy online. In an age where digital footprints last forever, the ability to separate your online identity from your real-world persona is more important than ever.

Maybe you're concerned about protecting yourself from online mobs that might target your job, your family, or your personal reputation. Maybe you don't want everything you say online to be permanently linked to your real name. Perhaps you have multiple interests or roles in life (professional, personal, creative) and want to maintain separate identities for each.

Maybe you simply value your privacy. Having a pseudonymous account can be liberating. It allows you the freedom to explore new ideas, revise your beliefs, and reinvent yourself without every past opinion you’ve ever expressed being etched in stone and forever tied to you.

But setting up a pseudonymous account on social media isn’t always straightforward. Your approach will depend heavily on the platform you're using. It will also depend on your threat model, which you can think of as whom you’re trying to hide your identity from, how private you need to be, and what’s at stake.

Threat models

It's essential to understand your own threat model clearly, because the steps you’ll need to take to create a pseudonymous social media identity will vary dramatically at each level. For example, hiding your opinions from your boss will require very different precautions than hiding from a hostile government that wants to target you for your political beliefs.

There are countless threat models, but here are 3 general categories to give you some ideas of where you might fit in:

1. Hiding from the general public, and preventing low-level insider doxxing

This is an easier level to achieve. You simply don't want your boss, colleagues, or random strangers linking your social media activity back to your real identity.

2. Hiding from the platform itself

Perhaps you have a higher profile, and you’re concerned about a platform employee accessing your personal details, billing information, or potentially doxxing you. At this level, you're not being actively targeted, but you also don’t want the platform to know who you are. Protecting your identity here gets trickier and requires a deeper understanding of internet tracking and more rigorous control over your digital footprint.

3. Hiding from a hostile government that is targeting you

This is an extreme threat scenario. Perhaps you live under a hostile regime where political dissent is dangerous and consequences for being identified online can be severe. This level of threat requires meticulous discipline, and a tailored approach that goes far beyond general privacy advice. We won’t cover this threat model in this newsletter -- not because it isn’t important, but because the stakes are too high for shortcuts. If your life or freedom could be at risk, please seek help from security professionals who specialize in operating anonymously under repressive conditions. Even small mistakes can be catastrophic.

Some organizations you might reach out to include:

Let’s use X as an example

Depending on which social media platform you want to use, the steps for setting up a pseudonymous account will vary dramatically. In this article, we’ll just focus on X as one example, because it’s a popular platform where pseudonymous accounts thrive. While Facebook aggressively pushes users to use real names and actively works to de-anonymize its users, X is a place where personas, satire accounts, and anonymous commentary are quite common.

That said, pseudonymity is a delicate privacy layer that can easily be broken. In this article, we are not providing exhaustive checklists, but rather examples of what kinds of mistakes lead to deanonymization, and tips for better protecting yourself.

Threat model 1: Hiding from the general public, and preventing low-level insider doxxing

Goal:
You simply don’t want random people or followers connecting your tweets to your real identity. You want to ensure that even the average X employee with backend access won’t immediately be able to see your real identity linked to your pseudonymous account. Perhaps you're worried about accidental exposure, corruption, or misuse of internal access.

Tips:

  • Choose a completely separate profile name and username
    • Select a pseudonym that has no obvious connection to your real-world identity (avoid birthdays, locations, or nicknames).
  • Create a new email address (use an email alias service)
    • Don’t reuse your personal or work email. Use an email alias service (like SimpleLogin) that you only ever use for this account.
    • Even though your email address isn’t publicly visible on your profile, data breaches are extremely common. Presume that your credentials will be leaked. If your email ties back to your real identity, your pseudonym is blown.
  • Use a VoIP number for verification
    • Your personal cell number is a unique identifier that's already been leaked everywhere. If you use it for verification, a data breach could link your identity to your pseudonymous account.
    • Use a VoIP service like MySudo or Cloaked to generate a clean, separate number.
  • Avoid personal identifiers
    • Don’t include real-world hobbies, your profession, specific locations, or distinctive personal details in your profile or posts.
  • Be careful whom you follow
    • Don’t follow your real account or people closely tied to you (e.g., best friend, sibling, coworker). These connections can unravel your anonymity.
  • Profile pictures and images
    • Don’t reuse photos from other accounts (reverse image searches can link them).
    • Consider AI-generated or royalty-free images.

These are some general tips that will help you. Just remember: any link, reference, or overlap between your pseudonymous account and real identity can risk exposure.

Threat model 2: Hiding from the platform itself

Goal:
You want to prevent the platform (X) from identifying you. This involves more sophisticated steps to scrub your digital footprint and reduce the metadata you leak by default.

This guide is not intended for people in life-threatening situations or under hostile regimes. It’s a conceptual framework for lower-risk scenarios, where the goal is to increase your privacy, not guarantee anonymity. Also keep in mind that this is not an exhaustive list -- it's a starting point for awareness, not a guarantee of protection.

This model assumes you’ve already followed all steps from Threat Model 1. From here, you're adding aggressive compartmentalization, anonymization, and metadata hygiene.

Core protections

  • Minimize metadata exposure
    • Always strip EXIF data from images before uploading. Use privacy-friendly tools (see our video on metadata scrubbing).
  • Use a masked or virtual payment method
    • If you subscribe to X Premium, use a virtual card like Privacy.com to avoid exposing your billing info. You can enter a fake name and billing address, and the payment will still go through (we talk about masked credit cards in this video).
  • Always use a VPN
    • VPNs help hide your IP address from the platform. Choose one that doesn't log (e.g., Mullvad, ProtonVPN). Use it consistently.
  • Careful device management
    • Access X only via a privacy-focused browser (like Brave), never the app. Apps collect far more data and can bypass system-level protections, often in a super sneaky way that users don’t even know about.
    • Use a dedicated browser profile or even a separate browser just for your pseudonymous identity. This prevents cross-contamination from cookies, autofill, and history.

Advanced protections

  • Never use personal internet connections
    • Avoid using home, work, or school Wi-Fi. Use public networks far from places associated with you.
    • Pay for your VPN anonymously (cash, crypto, gift card). Consider adding Tor as an additional layer.
  • Avoid platform fingerprinting
    • Disable JavaScript when feasible.• Avoid using a unique combination of extensions that can fingerprint you.
    • Regularly rotate browser profiles and clear cookies, local storage, and cache.
    • Consider disabling advanced fingerprinting vectors like canvas rendering and WebGL.
  • Make sure email and phone have also been set up anonymously
    • Your email should be created using anonymous methods and not linked to anything else you use.
    • Your VoIP number should also be generated in a way that avoids personal identifiers. Accidental crossover is one of the most common ways people get deanonymized.
  • Avoid revealing patterns
    • Vary your writing style and posting schedule.
    • Don’t engage with people or topics tied to your real-world identity.
    • Avoid posting about events or niche communities that could reveal your location or background.
  • Understand legal and jurisdictional risks
    • Be aware of keywords and behavior that could flag surveillance systems.
  • Don’t trust devices
    • Don’t bring your pseudonymous device near your home or workplace.
    • Wi-Fi probes and Bluetooth signals can reveal patterns.
    • Disable or remove mics/cameras where possible.
  • Use dedicated hardware and OS
    • Use a separate device that’s never touched your real accounts.
    • If that’s not possible, use isolated OSes (like Virtual Machines, Tails OS, Qubes OS) for advanced compartmentalization
    • Always wipe and reinstall OS if using secondhand hardware.• Never log in to pseudonymous and personal accounts from the same browser or device.
  • Limit interaction with the platform
    • Don’t click on X notifications or emails (they often contain trackers).
    • Avoid engaging unless it’s strategic.
  • Maintain a rotation schedule
    • Periodically “burn” your pseudonymous account and start fresh: new device, new email, new behavior.
    • The longer an identity lives, the more data accumulates.
    • Keep your footprint minimal and delete what you no longer need.

Threat model 3: Hiding from the government in a high-risk environment

Goal:
You live under a hostile regime where expressing dissenting opinions online carries severe consequences. For instance, you might be in Turkey, China, Iran, or another environment known for targeting political opponents, activists, or critical voices.

Is true anonymity possible?

Let’s be clear: achieving absolute, foolproof anonymity online is extraordinarily difficult. Governments have massive resources -- they have surveillance infrastructure, legal coercion, and advanced forensic tools. One small mistake can unravel everything.

This guide does not offer operational security for high-risk environments. If your life or freedom are on the line, consult with trained security professionals. Do not rely on generalized privacy guides.

What would that involve?

Just to give you a sense of what’s involved, you’d need to consider:

  • Buying hardware anonymously and avoiding camera networks
  • Creating burner accounts and rotating them frequently
  • Maintaining total behavioral and linguistic separation
  • Never discussing pseudonymous work, even with trusted friends
  • Compartmentalizing your life with extreme precision

And this is just the beginning. If this sounds overwhelming, that’s because it is.

If you’re in this situation: don’t go it alone.
Your safety is worth getting help.

The good news

The good news is that most people’s threat model doesn’t involve being specifically targeted by the government. What does that mean exactly? Targeting an individual requires considerable time, effort, and cost, so governments rarely do it unless there’s a clear reason. Instead, they rely on mass surveillance: automated systems that vacuum up data at scale and piece together your identity from the information you (or your devices) voluntarily give away.

And that’s why this is good news: most of this exposure is preventable. You don’t need extreme measures to protect yourself, you just need better defaults. By using VoIP numbers, email aliases, and privacy-focused browsers, you can significantly reduce how much of your life is available for collection in the first place. Small changes in behavior can go a long way toward protecting your identity and limiting what’s visible to mass surveillance systems.

Final thoughts

For most people, achieving basic pseudonymity online is much easier than it sounds. If your goal is to keep your professional life separate from your online commentary, or just to prevent casual Googling from exposing your social media presence, a thin veil of anonymity can go a long way. Choosing a new name, using a separate email and phone number, and keeping your circles compartmentalized are often all you need.

If you want a stronger break between your real identity and your online persona, you can layer on more privacy tools like VPNs, burner devices, and metadata hygiene. These steps aren’t just for activists or whistleblowers, they’re increasingly useful for anyone who wants to reclaim a sense of control in a world of hyper-connected data.

But if your life or freedom truly depends on staying anonymous -- if you are being targeted by a government or powerful institution -- then the game changes. In high-risk situations, pseudonymity becomes fragile. One careless follow, one reused phone number, one unstripped photo is all it takes to unravel everything. You need airtight operational security, and professional guidance to match the stakes.

No matter where you fall on that spectrum, this guide is here to help you think critically about how you engage online, and to offer practical, achievable steps that meet you where you are. Privacy is not a one-size-fits-all endeavor. What matters most is understanding your threat model, being consistent in your habits, and staying aware of the tradeoffs you're making.

Every privacy step you take makes a difference.

 

Your in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

The day your financial choices stopped being private

The Bank Secrecy Act of 1970 quietly flipped the switch on surveillance.

Published today 10:24 am
– By Naomi Brockwell

This week marks the 55th anniversary of the Bank Secrecy Act (BSA), a pivotal law that set us on the road to total financial surveillance. Last week I wrote about ways in which the Patriot Act eroded financial privacy, but the modern shift really began in 1970 with the BSA. Since its introduction, the BSA regime has grown staggeringly, and now touches basically every corner of the financial system. Financial privacy used to be assumed, but today the norm has flipped, and pervasive monitoring is treated as ordinary.

Let’s look back over five decades to see what changed, how much privacy we lost, and how this new baseline of surveillance became "just the way things are".

You can watch our video on the history of financial surveillance here.

The big shift

It appears that the collective memory has faded. We’ve forgotten that just a few decades ago, withdrawing one’s own funds was a straightforward right. There were no probing questions about the intended use of those funds or one’s occupation. The routine sharing of bulk transaction data with countless third parties was not the standard.

Today is a different story. We are required to justify our routine financial activities, authenticate our identity, and defend our choices at every financial turn. There has never been so much friction between us and our own money, with surveillance hurdles at every juncture just to pay for something online, and this new normal is an ingrained part of our expectations of using the financial ecosystem.

On top of that, behind the scenes, data pipelines spray a firehose of personal information to countless invisible players, and the data gets cycled from institutions, to brokers, to government entities, and back the other way.

How individuals interacted with the financial system 55 years ago versus today is night and day. Times really have changed, but they changed slowly, with a lot of these changes creeping in behind the scenes before the public ever realized what was going on.

The great privacy paradox

So we’ve established that financial privacy has never been worse. But here’s the confusing part about the situation: many people still go about their daily lives behaving as if what they do just stays between them and their bank, or between them and a given merchant.

A paradoxical situation has emerged, where most people continue to believe in a notion of financial privacy that has ceased to exist.

This widespread assumption that financial activities remain confidential, safeguarded by banks or credit unions, contrasts starkly with reality. In truth, financial privacy in the United States is more illusory than real.

How do we explain this mismatch between what people believe is true and the actual state of financial privacy?

First, privacy was the standard for so long, and then the systematic dismantling of our financial privacy occurred gradually over time without people really paying attention.

Second, the bulk of this increased surveillance has been intentionally kept hidden from the public.

This is the most insidious part of the situation, which I want to make very clear in this newsletter. The privacy we think we have and the privacy we actually have are very different things. Governments and banks would never have been able to get away with this shift if they hadn’t deliberately kept it out of view.

To explore the history of how financial privacy slowly disappeared, and to unveil the extensive financial surveillance apparatus that remains largely opaque to the general public, we have to go back through history and look carefully at how all of this surveillance crept in.

This analysis primarily focuses on developments within the United States, but the implications are global, thanks to the U.S. exporting its legislative and regulatory frameworks abroad. The trend toward financial surveillance is worldwide, with governments now monitoring payment systems across borders.

Where it all started

The year 1970 heralded a transformative period in financial privacy with the enactment of the Bank Secrecy Act. Its aim was to address concerns over secret foreign bank accounts by gathering more information on people’s financial activities, in order to combat the concealment of wealth in overseas accounts.

The BSA introduced a paradigm shift by requiring financial institutions to maintain records of customers’ transactions and personal information and to report significant transactions, specifically those exceeding $10,000, to the Treasury Department. This legislative move transformed financial professionals into de facto government informants, reporting on Americans for the mere act of engaging with their finances.

The law sparked considerable debate, drawing criticism from various quarters, including Congress, the banking sector, and civil liberties organizations. The New York Times even reported at the time that the law was unconstitutional. A legal challenge ensued, questioning the BSA’s compatibility with the First, Fourth, and Fifth Amendments.

Central to the legal debate was the Fourth Amendment, which safeguards individuals against unreasonable searches. The mandate for financial institutions to divulge personal financial information without a warrant was perceived as an infringement of this constitutional protection.

Despite these concerns, the Supreme Court ultimately upheld the BSA, reasoning that information shared with banks constitutes business records rather than private data, thus not warranting the same expectation of privacy. This completely undermined the expectation of privacy that people had always had with their banks.

The Supreme Court at the time commented that the reporting requirements for the banks were not an undue burden, because they applied only to “abnormally large transactions.” $10,000 in 1970 was indeed seen as abnormally large, because the purchasing power of the U.S. dollar was so much higher back then.

To put this amount in context, in 1970 $10,000 would buy you a new house in some areas. From this perspective, if you were paying all cash for an entire, brand new house, it might be a suspicious enough and rare enough occurrence that it was not seen as a burden on financial institutions to report this, nor an unreasonable intrusion into people’s daily lives.

However, the BSA never included any adjustment for inflation. Year after year, the purchasing power of the US dollar disappears, which means that this financial surveillance has silently and insidiously crept further and further into our lives. Now this threshold has extended into everyday transactions.

Since 1970, the Bank Secrecy Act’s powers have not only expanded silently through inflation but explicitly through all kinds of amendments that increase its scope.

The Annunzio-Wylie Anti-Money Laundering Act

One subsequent expansion of the BSA worth noting was the Annunzio-Wylie Anti-Money Laundering Act of 1992. It broadened the scope of reportable activities through the introduction of Suspicious Activity Reports (SARs). This shift from reporting threshold-based transactions (of $10,000 or more) to any transaction considered “suspicious,” regardless of size, opened the floodgates to a firehose of financial reporting.

Another big change that the Annunzio-Wylie Anti–Money Laundering Act ushered in was around transparency of these surveillance programs. When the Bank Secrecy Act was first introduced, it was countered with something called the Right to Financial Privacy Act, that essentially said that if people’s finances are being looked into, they at least need to be told about it, and that way individuals would have the right to push back and hold overreaching entities accountable if they felt their rights were being violated.

The 1992 Annunzio-Wylie Anti–Money Laundering Act made it illegal for your bank to tell you if it filed a SAR. To this day, you’re not allowed to know if your bank filed a report to the government for you using your own money.

It also introduced “safe harbors” for banks who share information with law enforcement: under the Annunzio-Wylie Anti–Money Laundering Act banks can’t be sued or held liable for giving data to law enforcement. There were no longer repercussions, or accountability measures to protect citizens against overreach of reporting.

This really ushered in a new era of mass surveillance of the financial activity of innocent Americans. The banking sector’s role has evolved from safeguarding depositor privacy to facilitating government surveillance. It’s also a major reason why people have this illusion of financial privacy. They just don’t realize what’s been happening, by design, because the whole surveillance process has been made confidential.

The Patriot Act

Last week I did a deep dive into the Patriot Act and how it was a watershed moment for financial surveillance, but I’ll provide a quick recap of some of the major changes. Basically, the Patriot Act was the Bank Secrecy Act on steroids. Title III of the Patriot Act, The International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001, aggressively cemented financial surveillance as a normalized part of everyday life.

First was the formalization of “Know Your Customer” (KYC) regulations, which have since become a staple in the arsenal of financial surveillance tools.

Before 2001, banks and institutions determined their own risk tolerance, and what customer information they needed to collect. The Patriot Act introduced minimum ID standards. It enforced a Customer Identification Program (CIP) for every bank, broker-dealers, mutual funds, and other similar institute in the US. These entities had to collect and verify government-issued IDs for every customer. They also had to cross-check identities against government watchlists.

This is when financial anonymity became illegal.

The Patriot Act also allowed unprecedented data sharing across agencies and borders. There used to be stringent rules about which government departments are allowed to share data with each other, again to protect citizens from overreach. Sections 351 and 358 broke down specific information-sharing barriers between the FBI, CIA, NSA, FinCEN, and foreign governments.

The Patriot Act also expanded safe harbor laws and allowed banking information to be shared with intelligence agencies. Mass data pipelines from private banks to the surveillance state were legalized overnight. Banks were encouraged to proactively share customer data with intelligence, without fear of being sued by the customer because they would have legal immunity.

It covered liability under “any contract or other legally enforceable agreement.” So if you had a contract with your bank that they’d keep your information private, the government said the bank now had immunity if they shared that information and broke the contract.

The intent of The Fourth Amendment was to stop the government getting your information without a warrant. But right now we have a system where the government has mandated that banks collect this information of their behalf, demanded they hand over the information, and then granted the banks legal immunity for this sharing or data, even if doing so broke “any contract or other legally enforceable agreement” of privacy between you and your bank.

On top of this, Section 314(b) created a safe harbor for financial institutions to share customer and activity information with other financial institutions, when they in good faith suspect money laundering or terrorist financing. It unleashed a torrent of data sharing, all legally protected.

Banks were now both required to report SARs and other information to the government, and they were legally shielded for aggressively and proactively doing so, and were also allowed to exchange intelligence with other banks. It fueled the private-sector surveillance grid that we have today, and deputized the financial system as investigatory agents in it.

The relationship between banks and Intelligence agencies was also formalized and made permanent. For example, it introduced something called government “broadcast lookups” where FinCEN can blast a query to thousands of financial institutions, and and banks must search their records quickly and report back. This shifted the relationship from passive reporting, to creating on-demand, system-wide queries, where banks have been deputized as active responders and participants.

Under the Patriot Act, FinCEN’s mission was also codified as financial intelligence, giving it a permanent mandate and making it a statutory intel hub.

The result is a permanent, legally protected data flow where financial institutions are effectively deputized, and customer information moves quickly to law enforcement and intelligence agencies.

Furthermore, we were told the Patriot Act would be a temporary measure, but it ended up lasting forever.

Omnibus bills for creeping surveillance

The trend of utilizing omnibus bills to quietly introduce or expand surveillance measures is ongoing. The American Rescue Plan Act of 2021, another omnibus bill, introduced surveillance to anything involving a payment transmitter (for example, PayPal, Venmo, or Cash App) that has $600 or more of transactions in a year.

In 2022, Congress floated the Special Measures to Fight Modern Threats Act, which aimed to eliminate some of the checks and balances placed on the Treasury. The Treasury Secretary has a special ability to sanction transactions and because this is such a powerful tool, there’s always been a check on this power — The Treasury Secretary has to report every time they do this in the Federal Register. The Fight Modern Threats Act tried to remove this reporting requirement, which would allow the Treasury to use these powers even more.

This bill hasn’t been passed, but it also hasn’t gone away either. Similar ideas keep resurfacing while Treasury continues to use existing Section 311 authorities through fresh 2025 actions.

There is an ongoing onslaught of bills that try to expand financial surveillance, and each time another one slips by, financial privacy in our lives is chiseled further and further away. It’s an offensive attack on the privacy expectations of innocent Americans.

Financial surveillance at the border

In September 2025, the Treasury’s Financial Crimes Enforcement Network (FinCEN) renewed and expanded a Geographic Targeting Order (GTO) that dramatically lowers the reporting threshold for cash transactions in certain areas, from $10,000 to transactions as low as $1,000.

This means that thousands of routine financial activities, like cashing a check or sending money to family, are now tracked and reported to federal authorities. The order compels businesses to collect personal information, file detailed reports, and retain records for five years.

Several lawsuits brought by the Institute for Justice have won preliminary injunctions, arguing that the GTO is unconstitutional, burdensome, and offers no proven crime-fighting benefit. Despite those court rulings, the government has appealed and continues to enforce the order in most affected areas.

CBDCs

The worst may be yet to come. Across the world, government officials have been increasingly considering central bank digital currencies, or CBDCs. A CBDC is a national currency that is a direct, digital liability of the central bank. You can think of it as a digital form of the dollar, but it’s much more than that. It would put the government in the middle of every financial transaction.

Rather than having to get our financial information from banks, the government would have access to every transaction directly. While right now, cash still affords people a private means of payment, a CBDC would eventually take the place of digital cash and eliminate that final privacy safeguard.

Furthermore, CBDCs aren’t just a digital form of money. They represent what’s known as programmable money. Rules can be coded directly into the money itself, dictating how it can be used. Money could instantly be frozen, savings seized, or certain transactions could automatically be prohibited according to predetermined rules about how money is allowed to move. Politicians are already salivating over such potential use cases.

It’s possible that the government could even do things like erase money that’s not spent fast enough, if they wanted to stimulate the economy.

Unfortunately, CBDCs are not simply theoretical. Basically every country in the world is currently exploring them. You can take a look at the Human Rights Foundation’s CBDC Tracker to see exactly where each country stands, and who has already launched one.

Those who champion CBDCs talk about how it will make our financial system more efficient, and bring it into the new age. Attention is focused on the shiny rhetoric, while yet another financial surveillance tool is slipped silently into our lives, making financial freedom just that little bit harder.

The cost of a zero-crime society

The legislative journey from the Bank Secrecy Act to the present day reflects a steady expansion of financial surveillance, driven by various rationales from combating crime to national security. When you erode financial privacy, critical questions need to be raised about the balance between security measures and individual rights.

Namely, to what extent should we as a society permit pervasive surveillance in the name of stopping crime?

To answer this question, it’s important to first recognize that the optimal crime rate is not zero. It’s a spicy take, but stick with me.

While a world with zero crime may intuitively seem better than a world with some crime, it depends on the costs of getting to that zero-crime world. We can’t bring the world to a halt to stop someone jaywalking, because the cost is too high. You can’t burn down a city to stop someone stealing a pack of gum. The cost is just too high.

We as a society need to have a conversation about which costs we’re willing to bear, and the balance we want between surveillance and privacy.

Traditionally that balance has been the Constitution, and in particular the Fourth Amendment. But the Fourth Amendment has been decimated in the digital age, and we’ve lost sight of that original Schelling point. We’ve tipped the balance scales in the complete opposite direction of the individual by stripping people of their right to privacy and allowing omnipotent surveillance of every financial activity, in the name of stopping anyone from ever committing a crime. And this cost is far too high.

Privacy is essential for a free society. If you eliminate this very thing that makes a free society possible, no matter what righteous cause you profess to be advancing, it’s a cost we can’t afford to bear.

It’s through surveillance that our freedoms are limited. Every totalitarian regime in existence maintained power through pervasive surveillance. Our financial activities reveal intimate details about us, including our religious beliefs, daily habits, and the causes we support that might hold powerful people accountable or challenge political authority.

Without financial privacy, all of these aspects become vulnerable to exploitation, and those involved are susceptible to being targeted. We must be vigilant against creeping surveillance that shifts the balance of power away from the individual.

And don’t get me wrong, removing the mass-surveillance apparatus we’ve created doesn’t mean ending the fight on crime. It just means respecting Fourth Amendment protections. If the government wants your information, they can get a warrant and prove probable cause. It’s not supposed to be absurdly easy for the government to dive into people’s private information. The purpose of the Constitution is to restrict the powers of government and protect the people.

Yet over the past few decades, we have slowly built a system of unchecked financial surveillance that makes it trivial for the government to search your affairs with impunity, and with almost no oversight or accountability. It’s time to question whether this is the world we want to live in.

I was invited to speak last week on a panel in DC about the history of Financial Surveillance. You can watch the whole talk here.

In summary: This is the new normal, and we need to push back.

The landscape of financial interaction was markedly different fifty years ago. Customers enjoyed greater autonomy in opening accounts and managing their money, often choosing to engage with banks based solely on the cash they possessed. The era was characterized by less scrutinized transactions and, occasionally, the absence of ID requirements for account setup. The discretion once afforded to banks in determining necessary information for account creation has been supplanted by federal mandates, with customer information no longer confined to the private domain of the bank-customer relationship.

Financial institutions now file 30 million reports annually under the BSA, often erring on the side of over-reporting to avoid potential penalties. This practice underscores the pervasive nature of financial surveillance, with significant costs borne by both the industry and consumers.

The BSA marked a fundamental shift in the confidentiality dynamics between individuals and financial institutions, effectively involving the government in financial interactions instead of allowing people the dignity of privacy.

As surveillance mechanisms become increasingly embedded within the financial system, the safeguards of freedom are slowly chipped away, and the worst part is that nobody really recognizes that this is what is happening. Most people continue to hold on to the illusion of privacy, because what’s actually going on has been both hidden from view and normalized.

Changing this is an uphill battle, but it’s one that’s worth fighting. The first step is just making people aware of how far financial surveillance norms have shifted in just a few decades. The narrative of combating terrorism and serious crimes, while compelling, must be weighed against the potential for overreach and the erosion of fundamental liberties. It is through ongoing dialogue, rigorous oversight, and a commitment to upholding individual rights that society can navigate these challenges, especially in today’s increasingly interconnected world.

You should be able to use your own money without being tracked, profiled, and stored forever in a government database, and without banks being allowed to trade your financial data with each other. Let’s fight to bring back dignity to the financial landscape.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Swedish laser method identifies chemical weapons and bacteria

Published yesterday 9:39 am
– By Editorial Staff
Today's analysis of dangerous bacteria requires special equipment and protective suits. The new method can make the work both faster and safer.

Swedish researchers have developed a groundbreaking laser method that can rapidly identify chemical weapons and dangerous bacteria directly in the field – without needing to send samples to a laboratory. The technology is based on the principle that chemicals emit unique light signals when struck by laser.

Hazardous chemicals can be found everywhere – as pollutants in waterways, pesticides in food, or in the form of synthetic substances created to cause harm, such as narcotics and chemical warfare agents. Protecting people from these substances requires fast and reliable detection methods.

A new dissertation from Umeå University in northern Sweden demonstrates how laser technology can solve this problem.

Rasmus Öberg, doctoral student at the Department of Physics and the Industrial Doctoral School at Umeå University, has developed methods in collaboration with the Swedish Defence Research Agency (FOI) that can identify extremely small quantities of hazardous chemicals.

Unique "fingerprint" from each chemical

The principle is based on different molecules reacting differently when exposed to laser light.

— All hazardous chemicals consist of molecules with specific appearances and properties that make them dangerous. When these chemicals interact with light, for example from a laser, they emit a 'fingerprint' – a light signal that is unique to that particular chemical, says Öberg.

The methods can be used in conflict zones or for environmental monitoring to provide a rapid initial assessment of potential hazards. The results can then be followed up with more thorough laboratory analyses if needed.

— Traditional methods for detecting hazardous chemicals are often quite cumbersome and difficult to use outside the lab. With portable instruments and surfaces that amplify the light signals from the chemicals, we can take these methods into the real world. The collaboration with FOI, which has extensive experience working with hazardous substances, has been invaluable in this work, he continues.

Also works against bacteria

The dissertation also shows that similar laser technology can be used to trace dangerous bacteria and bacterial spores. This has great significance for the food industry and healthcare, where antibiotic-resistant bacteria pose a growing threat.

— Biological substances are often more complicated to detect, but by isolating characteristic chemicals from these bacteria and bacterial spores, we can detect even them in relatively small quantities. This is an exciting complement to established biological detection methods such as bacterial culture and PCR, notes the doctoral student.

The researchers now hope for continued development of the technology for use in more contexts where rapid and reliable analysis is crucial. In the long term, the methods could strengthen preparedness and security in areas such as environment, defense, and health.

Musk praises Google’s quantum breakthrough: “Starting to become relevant”

The future of AI

Published October 23, 2025
– By Editorial Staff
Google's quantum computer chip Willow running the Quantum Echoes algorithm is 13,000 times faster than classical supercomputers.

Google has developed a quantum computing algorithm that, according to the company, opens up practical applications in areas including pharmaceutical research and artificial intelligence. The new algorithm is several thousand times faster than classical supercomputers.

Google announced on Wednesday that the company has successfully developed and verified the Quantum Echoes algorithm on its Willow quantum computing chip. The algorithm is 13,000 times faster than the most advanced classical computing algorithms running on supercomputers.

According to the company's researchers, Quantum Echoes could be used in the future to measure molecular structures, which could facilitate the development of new pharmaceuticals. The algorithm may also help identify new materials in materials science.

Another application is generating unique datasets for training AI models, particularly in areas such as life sciences where available datasets are limited.

— If I can't prove that data is correct, how can I do anything with it?, explained Google researcher Tom O'Brien about the importance of the algorithm being verifiable.

Details about Quantum Echoes were published in the scientific journal Nature. Entrepreneur Elon Musk congratulated Google on X and noted that quantum computing is starting to become relevant.

Alphabet's Google is competing with other tech giants such as Amazon and Microsoft to develop quantum computers that can solve problems beyond the reach of today's computers.

Over half a billion Chinese users embrace generative AI

The future of AI

Published October 22, 2025
– By Editorial Staff
AI services are used for intelligent search, content creation, as productivity tools, and in smart hardware.

The number of users of generative artificial intelligence in China has increased sharply during the first half of 2025. In June, 515 million Chinese people had access to AI services – an increase of 266 million in six months, according to official Chinese figures.

The data comes from a report presented on Saturday by the China Internet Network Information Center. It notes that domestically developed AI models have become popular among users.

A survey included in the report shows that over 90 percent of users say they prefer Chinese AI models.

Generative AI is being used in areas such as intelligent search, content creation, productivity tools and smart hardware. The technology is also being tested in agriculture, manufacturing and research.

The majority of users are young and middle-aged with higher education. Among users, 74.6 percent are under 40 years old, while 37.5 percent hold college, bachelor's or higher degrees.

The report claims that China has become increasingly important in the global AI field. As of April, the country had filed approximately 1.58 million AI-related patent applications, representing 38.58 percent of the global total – the most in the world.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.